Page 23 of 470 results (0.012 seconds)

CVSS: 9.0EPSS: 1%CPEs: 1EXPL: 1

17 Sep 2020 — A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. • https://github.com/felmoltor • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 9.6EPSS: 2%CPEs: 8EXPL: 0

10 Sep 2020 — Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 2%CPEs: 8EXPL: 0

10 Sep 2020 — Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

03 Sep 2020 — A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process. • https://www.whatsapp.com/security/advisories/2020 • CWE-265: Privilege Issues •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

21 Aug 2020 — This affects all versions of package safe-eval. It is possible for an attacker to run an arbitrary command on the host machine. Esto afecta a todas las versiones del paquete safe-eval. Es posible que un atacante ejecute un comando arbitrario en la máquina host. • https://github.com/hacksparrow/safe-eval/issues/19 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.6EPSS: 0%CPEs: 3EXPL: 0

12 Aug 2020 — Use after free in extensions in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension. • https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html • CWE-416: Use After Free •

CVSS: 9.6EPSS: 2%CPEs: 8EXPL: 0

22 Jul 2020 — Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

15 Jul 2020 — It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu... • https://launchpad.net/bugs/1880085 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

30 Jun 2020 — Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00040.html • CWE-416: Use After Free •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

22 Jun 2020 — Use after free in speech in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html • CWE-416: Use After Free •